How can OAuth 2.0 be implemented securely in web applications? This article explains why BFF is more secure than storing tokens in the browser — and when TMB still has its place.
Archiv.
Bank iD: Integrating with the NIA Ecosystem and Exploring its Potential
How do bank identity and Bank iD enhance security, improve user experience, and simplify processes for organizations? And how are they related to NIA?
NIA: Not Just a Digital Gateway to Government Services
Discover how NIA works – a system that securely verifies digital identity and simplifies access to online services. Did you know it can be used for more than just accessing your Data Mailbox or the Citizen Portal?
The New Czech Cybersecurity Act: What it Means for Identity and Access Management (IAM)
Why should the new law matter to you? The new rules will affect a significantly broader range of organizations than before, including most medium-sized and large companies.
From Account Management to Identity Governance – How IDM/IGA Increases Security and Efficiency
What is the difference between simple account management and comprehensive identity governance? And why is account management no longer enough?
CVE Program Celebrates 25 Years
The CVE Program is celebrating its 25th anniversary, and Wren Security is marking its first year among more than 400 CVE Numbering Authorities.
Case Study: Wren:IDM for University of South Bohemia
“Wren:IDM won us over with its speed and reliability. We now handle 80% fewer requests.”
Wren Security Added as CVE Numbering Authority
Wren Security, an open-source project for Identity and Access Management, is now added as CVE Numbering Authority.
Wren Security: the modern alternative to OpenAM, OpenIDM, OpenDJ
Wren Security products as an alternative to the well-known OpenAM, OpenIDM a OpenDJ products – originally open-source projects from ForgeRock
Wren:IDM Cookbook
We have created a selection of step-by-step recipes (samples) demonstrating key Wren:IDM features to make the beginnings easier.
Why you need identity management
Why move from IT’s manual account management to implementing Identity Management (IdM) for better company security and efficiency?
Why consider Zero Trust
Zero Trust is a security model that assumes every access to a network, application, or data storage must be verified and authorized.










